Note: | Kerberos authentication support is available at message level and at transport level. Kerberos authentication policy complies to the KerberosOverTransport section described in the following article, https://msdn.microsoft.com/en-us/library/aa751836(v=vs.110).aspx. Ensure that the Evaluate HTTP Basic Authentication policy is enforced and the Use Existing Credentials option is marked. |
Note: | Before configuring Kerberos, ensure that IS must be configured to LDAP as the incoming client credentials will be authenticated to verify whether its a valid LDAP user. Also, refer to the Configuring Kerberos in Integration Server chapter in the webMethods Integration Server Administrator’s Guide to complete the prerequisites. |
Note: | Before configuring Kerberos, refer to the Configuring Kerberos in Integration Server chapter in the webMethods Integration Server Administrator’s Guide to complete the prerequisites. |
Note: | To use the Delegate Incoming Credentials mode, ensure that in the krb.conf file, the forwardable parameter is set to true. |
Note: | The Mediator to native service communication must be over SSL. |
Enforcement Point | (Only for SOAP-based APIs). You can select the level at which the Kerberos outbound authentication support is available. | ||||
Value | Description | ||||
Transport Level | To use Kerberos over Transport Level. | ||||
Message Level | To use Kerberos over Message Level. | ||||
Authenticate Using: Custom Credentials | |||||
Value | Description | ||||
Client Principal | (String). A valid client LDAP user name. | ||||
Client Password | (String). A valid password of the client LDAP user. | ||||
Service Principal | (String). A valid Service Principal Name (SPN). The specified value will be used by the client to obtain a service ticket from the KDC server. The SPN is created in the Active Directory (AD) by the AD domain administrator using the following command: Setspn –a <domain name>\<username> spnname For example, setspn -a eur\user1 spnname
| ||||
Service Principal Name Form | The username form, for example, kerberospoc/bob1.SPARTA.RNDLAB.LOC | ||||
Authenticate Using: Delegate Incoming Credentials | |||||
Value | Description | ||||
Client Principal | (String). A valid client LDAP user name. | ||||
Client Password | (String). A valid password of the client LDAP user. | ||||
Service Principal | (String). A valid Service Principal Name (SPN). The specified value will be used by the client to obtain a service ticket from the KDC server. The SPN is created in the Active Directory (AD) by the AD domain administrator using the following command: Setspn –a <domain name>\<username> spnname For example, setspn -a eur\user1 spnname
| ||||
Service Principal Name Form | The username form, for example, kerberospoc/bob1.SPARTA.RNDLAB.LOC | ||||
Authenticate Using: Secure Alias | |||||
Value | Description | ||||
Alias Name | (String). Name to the alias configured. | ||||
Authenticate Using: Use Existing Credentials | |||||
Service Principal | (String). A valid Service Principal Name (SPN). The specified value will be used by the client to obtain a service ticket from the KDC server. The SPN is created in the Active Directory (AD) by the AD domain administrator using the following command: Setspn –a <domain name>\<username> spnname For example, setspn -a eur\user1 spnname
| ||||
Service Principal Name Form | The username form, for example, kerberospoc/bob1.SPARTA.RNDLAB.LOC |